Loading…

Secure Transmission Scheme Based on Dual-Thresholds for Simultaneous Wireless Information and Power Transfer

This paper studies a simultaneouswireless information and power transfer sys-tem with multiple external eavesdroppers andinternal curious users. We model the randomnetwork by Poisson cluster process in con-sideration of the case where eavesdroppershide around certain targets. Focusing on theusers th...

Full description

Saved in:
Bibliographic Details
Published in:China communications 2017-12, Vol.14 (12), p.25-44
Main Authors: Hu, Xin, Huang, Kaizhi, Chen, Yajun, Jin, Liang, Xu, Yunjia
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This paper studies a simultaneouswireless information and power transfer sys-tem with multiple external eavesdroppers andinternal curious users. We model the randomnetwork by Poisson cluster process in con-sideration of the case where eavesdroppershide around certain targets. Focusing on theusers that work in harvesting-transmittingmode with time switching receivers, we estab-lish communication model via time divisionmultiple access. On this basis, we propose alightweight secure transmission scheme basedon dual-thresholds for physical-layer securityenhancement, which consists of two protocolsapplied to the downlink (DL) and uplink (UL)transmission respectively. In the DL, we de-sign a dynamic information-power switchingtransmission protocol based on signal-to-noiseratio threshold, which provides an opportunis-tic approach to reform the fixed period alloca-tion of information and power transfer; in theUL, an energy threshold is proposed for usersto control the transmission, which is called auser-led on-off transmission protocol. Further-more, we give a comprehensive performanceanalysis for the proposed scheme in terms ofdelay, reliability, security and secrecy through-put. Based on the analysis results, we optimizethe two thresholds and the DL-UL allocationcoefficient to maximize the secrecy through-put. Simulation results show the proposedscheme can bring about a substantial secrecygain.
ISSN:1673-5447
DOI:10.1109/CC.2017.8246335